Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!

CCTV security cameras gather data during traffic surveillance.

Lessons learned from the ANPR data leak that shook Britain

The recent ANPR data leak raised questions regarding privacy versus data security with public surveillance systems. How do private and public organizations maintain transparency while protecting personal data?

A laptop with a virtual overlay of abstract code and a binary skull.

Auth0 Signals analyzes logins to block bots

Auth0 Signals, a key component to the Auth0 identity management platform, analyzes login attempts against four key criteria to identify and block script-based or bot attacks.

CSO Digital Magazine  >  Summer 2020 [cover]

Redefining the CISO role: Why the top security job is gaining C-suite and boardroom status

Breach concerns, data privacy regulations, and a move to separate security from IT are elevating the importance of the security role.

Test tube vial of serum labeled COVID-19 stands beside a respirator mask / coronavirus / pandemic

Protecting employee COVID-19 health data: What CISOs need to know

Most companies are tracking coronavirus-related health data of their employees, and this presents unique risks and security challenges for CISOs.

layered image of male executive holding thumbs up in CMYK

14 technology winners and losers, post-COVID-19

The coronavirus crisis has shaken up business as usual, with some IT strategies and tools rising to the occasion and others in line for a rethink or tough recovery post-pandemic.

virtual call center chat bot ai covid by jackie niam getty images

COVID-19 crisis accelerates rise of virtual call centers

Call center operations have increasingly gone remote, but the pandemic has accelerated the WFH CX support trend, as IT leaders at T-Mobile and American Express attest.

Conceptual art: Creative collaboration while physically distancing during the COVID-19 pandemic.

Why COVID-19 will change identity management forever

Large job losses, more people working from home, and an increased use of freelancers and consultants are forcing companies to rethink their access control models.

USA / United States Capitol Building / Congress / abstract digital infrastructure

New cybersecurity recommendations for US government target IoT, social media

The COVID-19 pandemic spurs the Cyberspace Solarium Commission policy initiative to issue a set of four security recommendations for the federal government in the wake of the crisis.

integration / exchange / unification / cohesion / unified blocks

10 things you should know about XDR

An initiative more than a technology, XDR seeks to simplify and unify security technologies to make the whole greater than the sum of its parts.

cso ts cloud  by ivanastar getty and sam schooler via unsplash

A 10-point plan to vet SaaS provider security

Using a software-as-a-service provider means giving up some control over security, so close vetting of SaaS security during vendor evaluation is critical.

remote workers larger talent pool

Q&A: Box CEO Aaron Levie looks at the future of remote work

Once a company focused on cloud-based file-sharing, Box now offers features to support remote productivity and teamwork. CEO Aaron Levie talks about his company's evolution – and how the workplace continues to change.

A shield protects against COVID-19 coronavirus-related threats.

What's next? CISOs weigh in on COVID’s long-term effects on security

CISOs are looking ahead to see how their security organizations need to work post-COVID. Here's what they expect.

A rusty old lock hangs open amid the flow of binary code.

Skipped patch from 2012 makes old Microsoft Office systems a favored target

Some organizations have still not implemented an Office patch from 2012. Attackers know this and are exploiting the vulnerability.

User hands on a laptop keyboard have a digital overlay reflecting data/analytics/tracking.

Securonix SIEM as a service has behavior analytics baked in

Organizations that want to concentrate on finding and removing threats using advanced techniques like user and device analytics would find a perfect match in the Securonix SIEM.

porting converting change update renew trees

8 ways to get more life out of an old SIEM

Can't update your old security information and event management system now? Use this advice to maintain its effectiveness.

scanning the internet malicious magnifying glass

Should you deploy a TLS 1.3 middlebox?

Organizations moving to the TLS 1.3 protocol must decide whether to deploy middleboxes that intercept network traffic for greater visibility, but doing so presents security and regulatory risks.

CSO  >  Antivirus symbol on binary background

PrintDemon vulnerability explained: Its risks and how to mitigate

Microsoft has finally patched the decades-old Windows PrintDemon vulnerability, but exploitable devices might still be on your network.

popcorn security theater lock by madartzgraphics and dbreen via pixabay

5 examples of security theater and how to spot them

Security theater is a term coined by Bruce Schneier to describe security measures that satisfy our emotional need to take action, but don’t actually improve security. Rooting these out can save considerable time and money -- and make...

cloud security expert casb binary cloud computing cloud security by metamorworks getty 100803072 or

How to use Microsoft Sysmon, Azure Sentinel to log security events

Microsoft's Sysmon and Azure Sentinel are easy and inexpensive ways to log events on your network. Here's how to get started with them.

collaboration / strategy / teamwork / transformation

Rethinking collaboration: 6 vendors offer new paths to remote work

With the need for efficient collaboration tools exploding in recent months, a variety of companies hope to refine how those tools work and what they can do. We look at six now pushing the envelope.

Load More